Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Submission Summary: 0 pending, 5 declined, 1 accepted (6 total, 16.67% accepted)

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - Idealism or Professionalism, which are you pursuing?->

Submitted by DontLickJesus
DontLickJesus (1141027) writes "'“You pushed your ideas.” Have you ever heard this? I have, and as a negative. We as developers work in a very collaborative way, so at first it’s understandable where this could be viewed poorly. However, when developing products for a client, how does one know when they are pushing idealism vs. professionalism?'

Where do we really draw this line in software development? Let's discuss."

Link to Original Source

+ - NBC / SNL Stealing Ad Revenue?-> 2

Submitted by
DontLickJesus writes "In a time when television networks are working hard to deal with the changes presented to them, NBC has been very successful in transition, providing much of their content online. However, it would seem this media giant doesn't want to shoulder all of the cost, to the detriment of their advertisers. Saturday Night Live recently featured skits with urls to see the skit again. These sites first load an intro page, simply showing an image of the skit which the user may click on to load the video. This may seem simple enough, but why the extra step?

Upon further examination, these pages have frames loaded first with advertisements which the user never sees. Both and use this technique, helping us to understand this wasn't a simple coding mistake. I've collected the responses from requesting these sites at in case they are changed later.

I cannot personally verify NBC's ties with the companies involved. However, it is not common for sites to be coded in the manner shown (though not unheard of). In my experience the most common use of the techniques involved are when sites are attempting to steal ad revenue or circumvent user anti-tracking mechanisms."

Link to Original Source

+ - How to get back at email scammers

Submitted by DontLickJesus
DontLickJesus (1141027) writes "Alright, so I have a "UK Lottery" scammer on the hook. I lead him on with a fake name, and they took the bait. I spoke with him on the phone using a Google Voice account, obviously a man of African decent faking a British accent. I could have him keep calling me to rack up long distance charges, but it doesn't seem like enough. We're at the point where they've solicited for money. Where do I go from here?"
Data Storage

+ - Hard Drives to have last stand against SSD's

Submitted by
DontLickJesus writes "It would seem that Western Digital's hard drives aren't going out without a fight. The Velociraptor runs at speeds arguably better than SSD's. And, while this article claims the HD is available at 33% the price of a 64GB SSD, that logic runs about a year late. While the new drive can honestly offer a little over double the space at the same speed at half the price, is the loss in lifetime worth it?"

+ - IT workers coushioned from US economic downturn->

Submitted by DontLickJesus
DontLickJesus (1141027) writes "According to the AP technology has been the least hardest hit by the U.S.'s recent economic downturn.

"Overall technology employment is up in America and the wages associated with it are up," said John McCarthy, a vice president with Forrester Research.

The article goes on to say that companies realize the worth of their [IT] staff. This paired along with a recent article regarding the value of data centers when selling a company leads one to believe that the business world, while historically not fond of IT workers, is showing it's true opinion of the sector. Have those reading this article in the tech sector recently experienced this, or is the business side just telling IT what it wants to hear?

Full Disclosure:
I am a developer for a Fortune 500 company in financial services, though in no way associated with the article."

Link to Original Source

+ - KaZaa "Push" legal implications

Submitted by
DontLickJesus writes "Back in 2000/2001 during KaZaa testing I was able to force upload a file to a client. This was accomplished through a blind reply to a download request in which I knew the hash of the file to be sent. The file hash was KaZaa's security check to make sure the client had asked for the right file. The basics where:

Request File
Get File Hash
Request File with Spoofed IP
Reply with known hash
Client downloads file

It seems this could easily create downloading relay nodes if the "Automatically Share Downloads" feature was turned on, and an easy defense for those unlucky enough to be harassed by the RIAA. It would be good for someone to do the same research on Limewire, etc.

I'm going to get flamed for not releasing the technical specs, but I have kids and no time to redo this research. Please someone pick it up, look at the white papers, and show what I'm talking about, thanks. I'm sure you're efforts will make you a god among geeks."

Put not your trust in money, but put your money in trust.